Acceptable Use Policy

As a provider of Internet access, web site hosting, and other Internet-related services, Infinitely Virtual offers its customers (also known as subscribers), and their customers and users, the means to acquire and disseminate a wealth of public, private, commercial, and non-commercial information. Infinitely Virtual respects that the Internet provides a forum for free and open discussion and dissemination of information, however, when there are competing interests at issue, Infinitely Virtual reserves the right to take certain preventative or corrective actions. In order to protect these competing interests, Infinitely Virtual has developed an Acceptable Use Policy ("AUP"), which supplements and explains certain terms of each customer's respective service agreement and is intended as a guide to the customer's rights and obligations when utilizing Infinitely Virtual's services. This AUP will be revised from time to time. A customer's use of Infinitely Virtual's services after changes to the AUP are posted on Infinitely Virtual's web site, www.infinitelyvirtual.com, will constitute the customer's acceptance of any new or additional terms of the AUP that result from those changes.

One important aspect of the Internet is that no one party owns or controls it. This fact accounts for much of the Internet's openness and value, but it also places a high premium on the judgment and responsibility of those who use the Internet, both in the information they acquire and in the information they disseminate to others. When subscribers obtain information through the Internet, they must keep in mind that Infinitely Virtual cannot monitor, verify, warrant, or vouch for the accuracy and quality of the information that subscribers may acquire. For this reason, the subscriber must exercise his or her best judgment in relying on information obtained from the Internet, and also should be aware that some material posted to the Internet is sexually explicit or otherwise offensive. Because Infinitely Virtual cannot monitor or censor the Internet, and will not attempt to do so, Infinitely Virtual cannot accept any responsibility for injury to its subscribers that results from inaccurate, unsuitable, offensive, or illegal Internet communications.

When subscribers disseminate information through the Internet, they also must keep in mind that Infinitely Virtual does not review, edit, censor, or take responsibility for any information its subscribers may create. When users place information on the Internet, they have the same liability as other authors for copyright infringement, defamation, and other harmful speech. Also, because the information they create is carried over Infinitely Virtual's network and may reach a large number of people, including both subscribers and non-subscribers of Infinitely Virtual, subscribers' postings to the Internet may affect other subscribers and may harm Infinitely Virtual's goodwill, business reputation, and operations. For these reasons, subscribers violate Infinitely Virtual policy and the service agreement when they, their customers, affiliates, or subsidiaries engage in the following prohibited activities:

Spamming -- Sending unsolicited bulk and/or commercial messages over the Internet (known as "spamming"). It is not only harmful because of its negative impact on consumer attitudes toward Infinitely Virtual, but also because it can overload Infinitely Virtual's network and disrupt service to Infinitely Virtual subscribers. Also, maintaining an open SMTP relay is prohibited. When a complaint is received, Infinitely Virtual has the discretion to determine from all of the evidence whether the email recipients were from an "opt-in" email list.

Intellectual Property Violations -- Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including copyrights, trademarks, service marks, trade secrets, software piracy, and patents held by individuals, corporations, or other entities. Also, engaging in activity that violates privacy, publicity, or other personal rights of others. Infinitely Virtual is required by law to remove or block access to customer content upon receipt of a proper notice of copyright infringement. It is also Infinitely Virtual's policy to terminate the privileges of customers who commit repeat violations of copyright laws.

Obscene Speech or Materials -- Using Infinitely Virtual's network to advertise, transmit, store, post, display, or otherwise make available child pornography or obscene speech or material. Infinitely Virtual is required by law to notify law enforcement agencies when it becomes aware of the presence of child pornography on or being transmitted through Infinitely Virtual's network.

Defamatory or Abusive Language -- Using Infinitely Virtual's network as a means to transmit or post defamatory, harassing, abusive, or threatening language.

Forging of Headers -- Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.

Illegal or Unauthorized Access to Other Computers or Networks -- Accessing illegally or without authorization computers, accounts, or networks belonging to another party, or attempting to penetrate security measures of another individual's system (often known as "hacking"). Also, any activity that might be used as a precursor to an attempted system penetration (i.e. port scan, stealth scan, or other information gathering activity).

Distribution of Internet Viruses, Worms, Trojan Horses, or Other Destructive Activities -- Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mailbombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the network or any connected network, system, service, or equipment.

Facilitating a Violation of this AUP -- Advertising, transmitting, or otherwise making available any software, program, product, or service that is designed to violate this AUP, which includes the facilitation of the means to spam, initiation of pinging, flooding, mailbombing, denial of service attacks, and piracy of software.

Export Control Violations -- Exporting encryption software over the Internet or otherwise, to points outside the United States.

Usenet Groups -- Infinitely Virtual reserves the right not to accept postings from newsgroups where we have actual knowledge that the content of the newsgroup violates the AUP.

Other Illegal Activities -- Engaging in activities that are determined to be illegal, including advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, and pirating software.

Other Activities -- Engaging in activities, whether lawful or unlawful, that Infinitely Virtual determines to be harmful to its subscribers, operations, reputation, goodwill, or customer relations.

As we have pointed out, the responsibility for avoiding the harmful activities just described rests primarily with the subscriber. Infinitely Virtual will not, as an ordinary practice, monitor the communications of its subscribers to ensure that they comply with Infinitely Virtual policy or applicable law. When Infinitely Virtual becomes aware of harmful activities, however, it may take any action to stop the harmful activity, including but not limited to, removing information, shutting down a web site, implementing screening software designed to block offending transmissions, denying access to the Internet, or take any other action it deems appropriate.

Infinitely Virtual is also aware that many of its subscribers are, themselves, providers of Internet services, and that information reaching Infinitely Virtual's facilities from those subscribers may have originated from a customer of the subscriber or from another third-party. Infinitely Virtual does not require its subscribers who offer Internet services to monitor or censor transmissions or web sites created by customers of its subscribers. Infinitely Virtual has the right to directly take action against a customer of a subscriber. Also, Infinitely Virtual may take action against the Infinitely Virtual subscriber because of activities of a customer of the subscriber, even though the action may affect other customers of the subscriber. Similarly, Infinitely Virtual anticipates that subscribers who offer Internet services will cooperate with Infinitely Virtual in any corrective or preventive action that Infinitely Virtual deems necessary. Failure to cooperate with such corrective or preventive measures is a violation of Infinitely Virtual's policy.

Infinitely Virtual is also concerned with the privacy of on-line communications and web sites. In general, the Internet is neither more nor less secure than other means of communication, including mail, facsimile, and voice telephone service, all of which can be intercepted and otherwise compromised. As a matter of prudence, however, Infinitely Virtual urges its subscribers to assume that all of their on-line communications are insecure. Infinitely Virtual cannot take any responsibility for the security of information transmitted over Infinitely Virtual's facilities.

Infinitely Virtual will not intentionally monitor private electronic mail messages sent or received by its subscribers unless required to do so by law, governmental authority, or when public safety is at stake. Infinitely Virtual may, however, monitor its service electronically to determine that its facilities are operating satisfactorily. Also, Infinitely Virtual may disclose information, including but not limited to, information concerning a subscriber, a transmission made using our network, or a web site, in order to comply with a court order, subpoena, summons, discovery request, warrant, statute, regulation, or governmental request. Infinitely Virtual assumes no obligation to inform the subscriber that subscriber information has been provided and in some cases may be prohibited by law from giving such notice. Finally, Infinitely Virtual may disclose subscriber information or information transmitted over its network where necessary to protect Infinitely Virtual and others from harm, or where such disclosure is necessary to the proper operation of the system.

Infinitely Virtual expects that its subscribers who provide Internet services to others will comply fully with all applicable laws concerning the privacy of on-line communications. A subscriber's failure to comply with those laws will violate Infinitely Virtual's policy. Finally, Infinitely Virtual wishes to emphasize that in signing the service agreement, subscribers indemnify Infinitely Virtual for any violation of the service agreement, law, or Infinitely Virtual's policy, that results in loss to Infinitely Virtual or the bringing of any claim against Infinitely Virtual by any third-party. This means that if Infinitely Virtual is sued because of a subscriber's or customer of a subscriber's activity, the subscriber will pay any damages awarded against Infinitely Virtual, plus costs and reasonable attorneys' fees.

We hope this AUP is helpful in clarifying the obligations of Internet users, including Infinitely Virtual and its subscribers, as responsible members of the Internet. Any complaints about a subscriber's violation of this AUP should be sent to abuse@infinitelyvirtual.com.

Enterprise Virtualization Environment

100% Uptime Guarantee

Every server at Infinitely Virtual is hosted on our Enterprise Virtualization Environment. E.V.E. enables us to offer our customers a 100% Uptime Guarantee. For details on E.V.E. and on how it can keep your system up 100% of the time, see Our Technology page. For information on our 100% Uptime Guarantee, see our Service Level Agreement.

30 Day Satisfaction Guarantee

We offer our customers an unconditional 30 day money back guarantee. If for any reason you are not completely satisfied with your Infinitely Virtual plan, you are entitled to a complete refund. Just login to the Customer Portal on or before the 30th day from the day you ordered your server, cancel your plan, and you will be given a full refund.

24x7x365 U.S. Based Support

We offer our customers an unconditional 30 day money back guarantee. If for any reason you are not completely satisfied with your Infinitely Virtual plan, you are entitled to a complete refund. Just login to the Customer Portal on or before the 30th day from the day you ordered your server, cancel your plan, and you will be given a full refund.

Virtual Dedicated Terminal Server

A Virtual Dedicated Terminal Server is a Windows Virtual Dedicated Server with Remote Desktop Session Host enabled. This server is a platform for sharing applications and data with users anywhere in the world.

Redundant Active Directory Contollers

This feature consists of two Windows Virtual Dedicated Servers configured as Active Directory Controllers. This enables users to authenticate once and access all network resources.

Virtual Dedicated Exchange Server

Plans with this feature have a Windows Virtual Dedicated Server configured as an Exchange server.

Sun Open Office

OpenOffice.org, commonly known as OOo or OpenOffice, is an open-source application suite whose main components are for word processing, spreadsheets, presentations, graphics, and databases.[6] It is available for a number of different computer operating systems, is distributed as free software and is written using its own GUI toolkit. It supports the ISO/IEC standard OpenDocument Format (ODF) for data interchange as its default file format, as well as Microsoft Office formats among others. As of November 2009, OpenOffice supports over 110 languages.

OpenOffice.org originated as StarOffice, an office suite developed by StarDivision and acquired by Sun Microsystems in August 1999. The source code of the suite was released in July 2000 with the aim of reducing the dominant market share of Microsoft Office by providing a free and open alternative; later versions of StarOffice are based upon OpenOffice.org with additional proprietary components. The OpenOffice.org project is primarily sponsored by Oracle Corporation (initially by Sun Microsystems). Other major corporate contributors include Novell, Red Hat, IBM, Google and others.

Sun Open Office

OpenOffice.org, commonly known as OOo or OpenOffice, is an open-source application suite whose main components are for word processing, spreadsheets, presentations, graphics, and databases.[6] It is available for a number of different computer operating systems, is distributed as free software and is written using its own GUI toolkit. It supports the ISO/IEC standard OpenDocument Format (ODF) for data interchange as its default file format, as well as Microsoft Office formats among others. As of November 2009, OpenOffice supports over 110 languages.

OpenOffice.org originated as StarOffice, an office suite developed by StarDivision and acquired by Sun Microsystems in August 1999. The source code of the suite was released in July 2000 with the aim of reducing the dominant market share of Microsoft Office by providing a free and open alternative; later versions of StarOffice are based upon OpenOffice.org with additional proprietary components. The OpenOffice.org project is primarily sponsored by Oracle Corporation (initially by Sun Microsystems). Other major corporate contributors include Novell, Red Hat, IBM, Google and others.

Pro, Premium, Accountant & Enterprise Editions

Quickbooks Pro and Premium

Easy to set up, easy to learn to use
The New User Setup includes coaching tips to help you navigate through your first tasks so you can get up and running easily. Plus, you can import your contacts from Excel or other email address books.

Organize your finances all in one place
See how your essential business tasks fit together on the QuickBooks Home page. Tasks are organized by group, like Vendors, Customers, and Banking. Workflow arrows show you how tasks relate to each other, helping you decide what to do next.

Easily create invoices and track sales & expenses
Create invoices quickly and save time tracking your sales, bills, and expenses. QuickBooks organizes everything in one place, so you can access all past invoices, payments, and bills with just a few clicks.

Get reliable records for tax time
Gain insights into your business and prepare for tax season with one-click tax reports. Drill down to see the details behind the numbers, and export your reports and all of your QuickBooks formatting to Excel.

Manage customer, vendor, and employee data
Use the Customer, Vendor, and Employee Centers to manage key data easily. The Customer Center, for example, gives you a single place to edit a customer's billing address, company name, phone number and more, and gives you quick access to related transactions.

Get a consolidated view of your business with Company Snapshot
Stay on top of your business by customizing your Company Snapshot. See at a glance year-over-year income and expense trends, along with details, and top customers.

Quickbooks Accountant

Save time and reduce errors by reclassifying transactions in batch rather than one at a time. Whether for a group of invoices, series of payments or inventory overview, this feature allows you to select and execute multiple transactions at once. Plus with Client Data Review, you will have exclusive access to eight highly specialized tools created specifically for accounting professionals. This set of eight specialized tools, available only in QuickBooks Accountant, can be accessed under the Accountant menu and will help you:

Reclassify transactions in batch instead of individually
This tool brings together several steps into one easily accessible window. Accounts are listed on the left and transactions in those accounts are on the right. Using checkboxes, select which transactions to reclassify, then select the account and class you want to reclassify to and push the Reclassify button.

Write-off invoices in batch instead of individually
This tool allows you to specify a group of invoices to write-off instead of doing them individually. There is no limit to the number of invoices you can write off at one time. Internally, each invoice that you write off is discounted. A memo is added to the invoice and the discount transaction. All invoices that you write off with this feature are tracked. To see the list anytime during the review, select Audit Trail of Review from the Client Data Review center.

Identify multiple payments that appear to be sales tax payments, but were not recorded, with the Pay Sales Tax function from one window
This happens when a client uses a regular check to pay Sales Tax. Using checkboxes, you can change all or some of the payments to Sales Tax Check with just a few clicks.

Quickly see and then fix inventory discrepancies from one screen
This tool contains several views of potential inventory problems. By changing which items are shown and the inventory criteria, you can see items in a way that best suits your client's company. After the inventory list is shown, you can QuickZoom to an inventory item and correct any errors. Status columns help identify irregularities in inventory, such as negative quantities or items that are out of balance.

Easily identify added, changed, deleted, or merged list items from the previous review period
The Review List Changes tool reports all list changes for the Chart of Accounts, Item List, Payroll Items, and Fixed Asset Items. This tool also contains direct access to the Customer and Vendor Centers and the Review Item Setup window.

Easily see changes to account balances from the previous close
The beginning balances in a client's books for the review period can be different from the balances from the accountant's records for the previous period. This feature displays the differences in balances and suggests adjusting entries to correct the opening balances.

Match unapplied vendor and customer payments/credits with invoices/charges from one window
This tool helps clean up unlinked transactions by listing payments/credits in the right column and invoices/charges in the left column. Using checkboxes, you can select which payments/credits to match up with invoices/charges.

Clear up undeposited funds account from one screen
If a deposit is created manually, rather than by selecting payments in the Payments to Deposit window, the amount of the payment can stay in the Undeposited Funds account indefinitely. From one screen, this tool allows you to link deposits to payments so you can quickly clear out the Undeposited Funds account.

Quickbooks Enterprise

Selected by more than 100,000 companies
QuickBooks Enterprise Solutions is the most flexible edition of America's #1 best selling small business accounting software.72 It works seamlessly with other small business products and services to help you run your business more efficiently.

See data the way you want with the most customizable reporting tools in QuickBooks.
Get clearer insights with twice as many custom data fields. Export, save, and reuse your QuickBooks report formatting for Excel.69 Combine reports from multiple company files, create financial statements and custom reports with ODBC-compliant applications.

Get a whole new level of control over user access.
Safeguard sensitive business data by giving employees access only to the specific information they need. Set individual user permissions for more than 115 different activities.

Adapt to the changing demands of your business.
Scale from 1 user to 30 simultaneous users and track hundreds of thousands of customers, vendors, and inventory items.5 Plus, you can work in two company files at the same time. Higher list limits let you add more Accounts, Classes, Customer and Vendor Types, To Do's, Customer Messages, and more.

Get the choice of managing inventory right inside QuickBooks.
Manage inventory with FIFO costing or average costing, serial number or lot tracking and multiple location inventory right in QuickBooks with Advanced Inventory. And now you can track items down to their bin locations and enter item data by scanning barcodes.

Access Enterprise Solutions any way and anywhere you want.
Enterprise Solutions delivers a choice of access options designed to maximize productivity wherever you do business. Unify remote workers and satellite offices with a real-time link to your QuickBooks data with Remote Desktop Services.12 Or step up to the security and convenience of a protected environment with our Hosting Service.76 We take care of installing, updating and automatically backing up your software, so you don't have to.

Transition seamlessly with Enterprise Solutions’ familiar QuickBooks look and feel.
Upgrading from QuickBooks Pro or Premier is fast and easy. Simply open your company file in Enterprise Solutions and your QuickBooks data, report templates, and user permissions automatically transfer over to Enterprise Solutions.

Install 3rd Party Applications

Plans feature the ability to install any supported applications.

Microsoft Office

Microsoft Office is an office suite of interrelated desktop applications, servers and services for the Microsoft Windows and Mac OS X operating systems, introduced by Microsoft in 1989. Initially a marketing term for a bundled set of applications, the first version of Office contained Microsoft Word, Microsoft Excel, and Microsoft PowerPoint. Additionally, a "Pro" (Professional) version of Office included Microsoft Access and Schedule Plus. Over the years, Office applications have grown substantially closer with shared features such as a common spell checker, OLE data integration and Microsoft Visual Basic for Applications scripting language. Microsoft also positions Office as a development platform for line-of-business software under the Office Business Applications (OBA) brand.

The current versions are Office 2010 for Windows which was released on June 15, 2010, and Office 2008 for Mac OS X, released January 15, 2008. Office 2007/Office 2008 introduced a new user interface and new Office Open XML document formats (docx, xlsx, pptx). Consequently, Microsoft has made available, free of charge, an add-on known as the Microsoft Office Compatibility Pack to allow Office 2000-2003 for Windows and Office 2004 for Mac editions to open, edit, and save documents created under the new formats for Office 2007.

Managed Site-to-Site IPSec VPN

This unique feature allows us to place your virtual servers inside your office network.Support IP printing and scanning
Enable everyone at the office to securely share files without configuring pptp vpn
Join Windows XP, Vista and 7 Professional to an Active Directory
Join your virtual server to your office Active Directory
A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same, secure capabilities, but at a much lower cost.

It encapsulates data transfers between two or more networked devices not on the same private network so as to keep the transferred data private from other devices on one or more intervening local or wide area networks. There are many different classifications, implementations, and uses for VPNs.

Requires Manged Firewall

Private VLAN

Plans with this feature are multi-server environments. We place all of the servers in a private VLAN, dedicated to a single customer. The entire VLAN is behind our clustered enterprise firewalls. Servers in this VLAN can communicate in a secure space.

PPTP VPN

With our PPTP VPN option, you can simply connect using Microsoft Window's built in VPN software, open, modify and save files using applications on any Internet connected computer.

SharePoint Foundation 2013

SharePoint Foundation 2013 provides a web-based collaboration platform that’s more secure and easy to manage. With SharePoint Foundation, your people can quickly access the documents and information they need to make good decisions and get work done. For information on SharePoint features, see

Dell RemoteScan

Dell RemoteScan® provides hassle-free desktop scanner connectivity for thousands of companies across various industries in nearly 120 countries, with more than one billion documents scanned worldwide.
Dell RemoteScan is the most stable, secure and seamless software solution for image acquisition in hosted environments.

Scan into any application on any server
Works with any imaging device, all TWAIN or WIA scanners, RDP and ICA

Dedicated OS

Our VMware based Virtual Dedicated Servers consist of virtualized hardware and a dedicated operating system for each customer. Virtual hardware components include:
System board & bios
CPU
RAM
Video card
Floppy
CD/DVD Drive
Network adapter
SCSI controller
Hard disks
Since no part of the operating system is shared with other servers, customers have complete control over their VDS' operating system. They can install any operating system feature or component, and they can configure it in any way they need.

Infinitely Scalable

You may customize every plan at Infinitely Virtual. This allows you to create the perfect environment for your application. This innovation is one of our most important features. You buy just as much processing power, RAM and storage as you need. See our unique plan customization control panel.
Add 2.5 Ghz CPU Cores - up to 12 cores
Add RAM in increments of 125 MB - up to 32 GB
Add high-speed disk space in increments of 1 GB - up to 2 TB
Add SATA disk space in increments of 10 GB - up to 2 TB
Add monthly transfer in increments of 500 GB - up to 4 TB
Later, as your application grows, you can incrementally add resources. Increasing server performance at traditional hosting companies is far riskier and requires far more downtime. If you decide to customize your server after it is installed, with just as much time as it takes to restart your server, we can create your perfect environment.

Virtual KVM

KVM stands for keyboard-video-mouse. Our Virtual KVM enables you to access the console of your server from anywhere in the world. Choose between the fully-functional vSphere client or a web portal. From there you can interact with your server's console, whether or not the operating system is installed or functioning. If you have multiple servers, you can manage them all from this one management platform. Some unique features include:
Install & configure your operating system
Disable RDP, VNC, Telnet & SSH
Watch your server post
Troubleshoot operating system errors

Administrator Login

Every Windows Virtual Dedicated Server comes with administrator account login credentials. You have complete control over your server's operating system.

Virtual CD/DVD & Floppy

Install operating systems and applications from anywhere in the world with our Virtual CD/DVD & Floppy drives. Simply insert a CD, DVD or floppy disk and read it directly from your virtual dedicated server. For larger jobs, you can encode your CD or DVD into an ISO, upload it to your catalog, and from there mount it directly to your server.

Remote Desktop for Management

All Windows Virtual Dedicated Server plans may be managed using Microsoft Remote Desktop. By default this feature is disabled. Users may enable it simply by using our vSphere client.

Virtual Power Button

Gracefully shut down or restart your server by simply clicking your Virtual Power Buttons. These work just like the power button on your home or office computer. If for some reason your server is not responding, simply click the Power Off or Reset button. Combine this with our Virtual KVM, and you are in complete control of your environment.
Power down your server for maintenance
Restart the server if the OS locks up
Troubleshoot software installation

SNMP Monitoring

To ensure the best possible performance, we give our customers free SNMP monitoring. Every server in our environment is monitored by our enterprise NMS. We constantly monitor CPU usage, RAM usage and disk usage, and if your server exceeds our norms, we notify you so you can take corrective action.

Access to Network Performance Monitor

Every plan includes SNMP monitoring by our enterprise Network Performance Monitor (NPM). We monitor RAM, CPU and disk usage and notify you by email if your servers are outside operational norms.

Purchase this option and gain access to our NPM. View current and historical resource utilization. See events, alerts and availability reports for all of your nodes.

Customers with multiple servers and plans can purchase this on just one plan and gain access to all of the servers in your account.

VMware Fault-Tolerance

VMware Fault Tolerance provides continuous availability for applications in the event of server failures, by creating a live shadow instance of a virtual machine that is in virtual lockstep with the primary instance. By allowing instantaneous failover between the two instances in the event of hardware failure, VMware Fault Tolerance eliminates even the smallest chance of data loss or disruption.

Remote Desktop Session Host

A Remote Desktop Session Host (RD Session Host) server is the server that hosts Windows-based programs or the full Windows desktop for Remote Desktop Services clients. Users can connect to an RD Session Host server to run programs, to save files, and to use network resources on that server. Users can access an RD Session Host server by using Remote Desktop Connection or by using RemoteApp.

Supports Windows, Linux, Mac & Thin Clients

Web Server

Web servers are computers that have specific software that allows them to accept requests from client computers and return responses to those requests. Web servers let you share information over the Internet, or through intranets and extranets.
With a Web server, you can:
Provide information to users on the Internet.
Let users download and upload content with FTP or World Wide Web Distributed Versioning and Authoring (WebDAV).
Host Web services that contain business logic for three-tier applications.
Distribute applications to users over the Internet instead of through physical media, such as floppy disks or CDs.

Microsoft SQL Server

Includes Microsoft SQL Express Edition.

Active Directory Certificate Services

Active Directory® Certificate Services (AD CS) in the Windows Server® 2008 operating system provides customizable services for creating and managing public key certificates used in software security systems employing public key technologies. Organizations can use AD CS to enhance security by binding the identity of a person, device, or service to a corresponding private key. AD CS also includes features that allow you to manage certificate enrollment and revocation in a variety of scalable environments.

Active Directory Domain Services

AD DS provides a distributed database that stores and manages information about network resources and application-specific data from directory-enabled applications. Administrators can use AD DS to organize elements of a network, such as users, computers, and other devices, into a hierarchical containment structure. The hierarchical containment structure includes the Active Directory forest, domains in the forest, and organizational units (OUs) in each domain. A server that is running AD DS is called a domain controller.

Active Directory Federation Services

Active Directory® Federation Services (AD FS) is a component in the Windows Server® 2008 operating system that provides web single-sign-on (SSO) technologies to authenticate a user to multiple web applications over the life of a single online session.

AD Rights Management Services

AD RMS, a format and application-agnostic technology, provides services to enable the creation of information-protection solutions. It will work with any AD RMS-enabled application to provide persistent usage policies for sensitive information. Content that can be protected by using AD RMS includes intranet websites, email messages, and documents. AD RMS includes a set of core functions that allow developers to add information protection to the functionality of existing applications.

Application Server

Application Server is an expanded server role in the Windows Server® 2008 operating system. The new version of Application Server provides an integrated environment for deploying and running custom, server-based business applications. These applications respond to requests that arrive over the network from remote client computers or from other applications. Typically, applications that are deployed and run on Application Server take advantage of one or more of the following:

Internet Information Services (IIS) (the Hypertext Transfer Protocol (HTTP) server that is built into Windows Server)
Microsoft® .NET Framework versions 3.0 and 2.0. (If you have applications that are built with the .NET Framework 3.5, you can download and install the .NET Framework 3.5 onto the operating system.)
ASP.NET
COM+
Message Queuing
Web services that are built with Windows Communication Foundation (WCF)

DNS Server

DNS is a system for naming computers and network services that organizes them into a hierarchy of domains. DNS naming is used on TCP/IP networks, such as the Internet, to locate computers and services with user-friendly names. When a user enters the DNS name of a computer in an application, DNS clients and servers work together to look up the name and provide other information that is associated with the computer, such as its IP address or services that it provides for the network. This process is called name resolution.

The DNS server role makes it possible for a server running Windows Server® 2008 to act as a name resolution server for a TCP/IP network. The network can contain computers running Windows as well as computers running other operating systems. The DNS service in Windows Server 2008 is tightly integrated with Dynamic Host Configuration Protocol (DHCP) so that Windows-based DHCP clients and Windows-based DHCP servers automatically register host names and IP addresses on the DNS server for the appropriate domain.

Routing & Remote Access Services

The Routing and Remote Access service in the Windows Server® 2008 operating system provides remote users access to resources on your private network over virtual private network (VPN) or dial-up connections. Servers configured with the Routing and Remote Access service can provide local area network (LAN) and wide area network (WAN) routing services used to connect network segments within a small office or to connect two private networks over the Internet.

Network Policy Server

Network Policy Server is the Microsoft implementation of a Remote Authentication Dial-In User Service (RADIUS) server and proxy. You can use NPS to centrally manage network access through a variety of network access servers, including wireless access points, VPN servers, dial-up servers, and 802.1X authenticating switches. In addition, you can use NPS to deploy secure password authentication with Protected Extensible Authentication Protocol (PEAP)-MS-CHAP v2 for wireless connections. NPS also has key components for deploying Network Access Protection (NAP) on your network.

Print Services

Print Services enables you to share printers on a network and centralize print server and network printer management tasks by using the Print Management snap-in. Print Management helps you monitor print queues and receive notifications when print queues stop processing print jobs. It also enables you to migrate print servers and deploy printer connections by using Group Policy.

UDDI Services

Universal Description, Discovery, and Integration (UDDI) is an industry specification for publishing and locating information about Web services. UDDI Services provides UDDI-compliant capabilities for use within an enterprise or between business partners. With UDDI Services, developers can publish, discover, share, and interact with Web services directly through their development tools and business applications.

Web Server

Web servers are computers that have specific software that allows them to accept requests from client computers and return responses to those requests. Web servers let you share information over the Internet, or through intranets and extranets.
With a Web server, you can:
Provide information to users on the Internet.
Let users download and upload content with FTP or World Wide Web Distributed Versioning and Authoring (WebDAV).
Host Web services that contain business logic for three-tier applications.
Distribute applications to users over the Internet instead of through physical media, such as floppy disks or CDs.

Remote Desktop Services

Remote Desktop Services in Windows Server® 2008 R2 (formerly Terminal Services) provides technologies that enable users to access Windows-based programs that are installed on a Remote Desktop Session Host (RD Session Host) server, or to access the full Windows desktop. With Remote Desktop Services, users can access an RD Session Host server from within a corporate network or from the Internet.

Windows Deployment Services

Windows Deployment Services is the updated and redesigned version of Remote Installation Services (RIS). Windows Deployment Services assists with the rapid adoption and deployment of Windows operating systems. You can use it to set up new computers through a network-based installation without having to be present physically at each computer and without having to install Windows directly from CD media.

Infinitely Scalable Screenshot

Reliable

Infinitely Virtual offers best-in-class storage, because we understand that application performance goes hand-in-hand with data security. There is no faster solution on the market, and that gives practices and hospitals using Infinitely Virtual’s HIPPA-compliant cloud hosting a decided edge.

Secure

Infinitely Virtual is a Cloud Service Provider. Service literally is our middle name. That’s why we offer a 30-day, 100% money-back guarantee. We don’t rely on contracts; relationships are month to month. We can host any application -- if it runs on Windows or Linux, we can host it. And because we can host any application, medical practices and hospitals can consolidate their entire infrastructure with us. If they do, they are entitled to free migration and updates. Our engineers will migrate software and data at no additional cost, and implement application upgrades for free. We understand that problems and issues don’t adhere to regular business hours; Infinitely Virtual customers are entitled to U.S.-based tech support any time of the day or night, 24x7x365.

Private

Our obsession with security is one reason we earned the highest rating of "Enterprise-Ready™" in Skyhigh Networks’ CloudTrust™ Program for four of our offerings: Cloud Server Hosting, InfiniteVault, InfiniteProtect and Virtual Terminal Server. Skyhigh provides an objective and detailed risk assessment of more than 9,000 cloud services across 50 attributes developed in conjunction with the Cloud Security Alliance (CSA).